{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:32:30Z","timestamp":1765369950902,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["M21039"],"award-info":[{"award-number":["M21039"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11227-021-04193-6","type":"journal-article","created":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T12:04:03Z","timestamp":1641816243000},"page":"8509-8530","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Identity-based public data integrity verification scheme in cloud storage system via blockchain"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9021-5616","authenticated-orcid":false,"given":"Yilin","family":"Yuan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianbiao","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wanshan","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zheng","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,1,10]]},"reference":[{"key":"4193_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, and Song D (2007) Provable data possession at untrusted stores. In: Proc. 14th ACM Conference on Computer and Communications Security. pp. 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"key":"4193_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese G, Dipietro R, Mancini LV, and Tsudik G (2008) Scalable and efficient provable data possession. In: Proc. 4th International Conference on Security and Privacy in Communication Netowrks, pp. 1\u201310","DOI":"10.1145\/1460877.1460889"},{"issue":"1","key":"4193_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1952982.1952994","volume":"14","author":"G Ateniese","year":"2011","unstructured":"Ateniese G, Burns R, Curtmola R, Joseph H, Osama K, Lea K, Zachary P, Song D (2011) Remote data checking using provable data possession. ACM Trans Inform Syst Security 14(1):1\u201334","journal-title":"ACM Trans Inform Syst Security"},{"key":"4193_CR4","doi-asserted-by":"crossref","unstructured":"Erway CC, Kupcu A, Papamanthou C, and Tamassia R (2009) Dynamic provable data possession. In: Proc. 16th ACM Conference on Computer and Communications Security, pp. 213\u2013222","DOI":"10.1145\/1653662.1653688"},{"key":"4193_CR5","doi-asserted-by":"crossref","unstructured":"Juels Aand Kaliski BS (2007) PORs: Proofs of Retrievability for Large Files. In: Proc. 14th ACM Conference on Computer and Communications Security, pp. 584\u2013597","DOI":"10.1145\/1315245.1315317"},{"issue":"3","key":"4193_CR6","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442\u2013483","journal-title":"J Cryptol"},{"issue":"3","key":"4193_CR7","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TIFS.2014.2384391","volume":"10","author":"AF Barsoum","year":"2015","unstructured":"Barsoum AF, Hasan MA (2015) Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans Inf Forensics Secur 10(3):485\u2013497","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"4193_CR8","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TSC.2012.35","volume":"6","author":"H Wang","year":"2013","unstructured":"Wang H (2013) Proxy provable data possession in public clouds. IEEE Trans Service Comput 6(4):551\u2013559","journal-title":"IEEE Trans Service Comput"},{"issue":"5","key":"4193_CR9","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TIFS.2017.2656461","volume":"12","author":"YJ Wang","year":"2017","unstructured":"Wang YJ, Wu QH, Tang SH, Willy S (2017) Online-offline provable data possession. IEEE Trans Inf Forensics Secur 12(5):1182\u20131194","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4193_CR10","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.future.2019.01.009","volume":"95","author":"W Guo","year":"2019","unstructured":"Guo W, Zhang H, Qin SJ, Gao F, Jin ZP, Li WM, Wen QY (2019) Outsourced dynamic provable data possession with batch update for secure cloud storage. Futur Gener Comput Syst 95:309\u2013322","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"4193_CR11","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang C, Chow SM, Wang Q, Ren K, Lou WJ (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362\u2013375","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"4193_CR12","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/TIFS.2015.2400425","volume":"10","author":"J Yu","year":"2016","unstructured":"Yu J, Ren K, Wang C, Varadharajan V (2016) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10(6):1167\u20131179","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4193_CR13","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system http:\/\/www.cryptovest.co.uk\/resources\/Bitcoin"},{"issue":"4","key":"4193_CR14","first-page":"481","volume":"42","author":"Y Yuan","year":"2016","unstructured":"Yuan Y, Wang FY (2016) Blockchain: the state of the art and future trends. Acta Automatica Sinica 42(4):481\u2013494","journal-title":"Acta Automatica Sinica"},{"key":"4193_CR15","doi-asserted-by":"crossref","unstructured":"Zheng ZB, Xie SA, Dai HN, Chen XP and Wang HM (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: Proc 2017 IEEE International Congress on Big Data (BigData Congress)","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"4193_CR16","doi-asserted-by":"crossref","unstructured":"Kumar A, Fischer C, Tople S, Saxena P (2017) A traceability analysis of Moneros blockchain. In: Proc ESORICS, pp. 153\u2013173","DOI":"10.1007\/978-3-319-66399-9_9"},{"key":"4193_CR17","doi-asserted-by":"crossref","unstructured":"Sun SF, Au MH, Liu JK, Yuen TH (2017) RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Scheme for Blockchain Cryptocurrency Monero. In: Proc ESORICS, pp. 456\u2013474","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"4193_CR18","doi-asserted-by":"crossref","unstructured":"Sasson E, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: Decentralized anonymous payments from bitcoin. In: Proc 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474","DOI":"10.1109\/SP.2014.36"},{"key":"4193_CR19","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"XQ Li","year":"2020","unstructured":"Li XQ, Jiang P, Chen T, Luo XP, Wen QY (2020) A survey on the security of blockchain systems. Futur Gener Comput Syst 107:841\u2013853","journal-title":"Futur Gener Comput Syst"},{"key":"4193_CR20","doi-asserted-by":"crossref","unstructured":"Zhang R, Xue R and Liu L (2019) Security and privacy on Blockchain. In: ACM Computing Surveys. 52:3.","DOI":"10.1145\/3316481"},{"key":"4193_CR21","doi-asserted-by":"crossref","unstructured":"Bach LM, Mihaljevic B and Zagar M (2018) Comparative analysis of blockchain consensus algorithms. In: Proc International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).","DOI":"10.23919\/MIPRO.2018.8400278"},{"issue":"8","key":"4193_CR22","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MCOM.2018.1701095","volume":"56","author":"ZH Xiong","year":"2018","unstructured":"Xiong ZH, Zhang Y, Niyato D, Wang P, Han Z (2018) When mobile Blockchain meets edge computing. IEEE Commun Mag 56(8):33\u201339","journal-title":"IEEE Commun Mag"},{"key":"4193_CR23","first-page":"443","volume":"11342","author":"N Fotiou","year":"2018","unstructured":"Fotiou N, SirisGeorge VA, Polyzos C (2018) Interacting with the internet of things using smart contracts and Blockchain technologies. Proc on Security, Privacy and Anonym Comput Commun Storage 11342:443\u2013452","journal-title":"Proc on Security, Privacy and Anonym Comput Commun Storage"},{"key":"4193_CR24","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.ins.2018.06.018","volume":"462","author":"YH Zhang","year":"2018","unstructured":"Zhang YH, Deng RH, Liu XM, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262\u2013277","journal-title":"Inf Sci"},{"key":"4193_CR25","doi-asserted-by":"publisher","first-page":"9819","DOI":"10.1007\/s11042-019-07900-x","volume":"79","author":"X Xu","year":"2020","unstructured":"Xu X, Chen Y, Yuan Y, Huang T, Zhang XY, Qi LY (2020) Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing. Multimed Tools and Appl 79:9819\u20139844","journal-title":"Multimed Tools and Appl"},{"key":"4193_CR26","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume":"196","author":"A Shamir","year":"1984","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. Cryptology 196:47\u201353","journal-title":"Cryptology"},{"key":"4193_CR27","first-page":"213","volume":"2139","author":"D Boneh","year":"2001","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from the weil-pairing. Cryptology 2139:213\u2013229","journal-title":"Cryptology"},{"issue":"8","key":"4193_CR28","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1049\/el:20020682","volume":"38","author":"KG Paterson","year":"2002","unstructured":"Paterson KG (2002) ID-based signatures from pairing on elliptic curves. Electrics Letters 38(8):1025\u20131026","journal-title":"Electrics Letters"},{"issue":"2","key":"4193_CR29","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/LCOMM.2002.808397","volume":"7","author":"Y Xun","year":"2003","unstructured":"Xun Y (2003) An identity-based signature scheme from the Weil pairing. IEEE Commun Lett 7(2):76\u201378","journal-title":"IEEE Commun Lett"},{"key":"4193_CR30","first-page":"18","volume":"2567","author":"JC Cha","year":"2003","unstructured":"Cha JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups. Proc Int Workshop on Public Key Cryptograp 2567:18\u201330","journal-title":"Proc Int Workshop on Public Key Cryptograp"},{"issue":"2","key":"4193_CR31","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/TIFS.2018.2850312","volume":"14","author":"WT Shen","year":"2019","unstructured":"Shen WT, Qin J, Yu J, Hao R, Hu JK (2019) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Foren Secur 14(2):331\u2013346","journal-title":"IEEE Trans Inf Foren Secur"},{"issue":"6","key":"4193_CR32","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TIFS.2016.2520886","volume":"11","author":"HQ Wang","year":"2016","unstructured":"Wang HQ, He DB, Tang SH (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165\u20131176","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"4193_CR33","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TDSC.2017.2662216","volume":"16","author":"YN Li","year":"2019","unstructured":"Li YN, Yu Y, Min GY, Susilo W, Ni JB, Choo KR (2019) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Dependable Secure Comput 16(1):72\u201383","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"4193_CR34","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2017","unstructured":"Yu Y, Au MH, Ateniese G, Huang XY, Susilo W, Dai YS, Min GM (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767\u2013778","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4193_CR35","first-page":"97","volume":"156","author":"X Zou","year":"2020","unstructured":"Zou X, Deng XT, Wu T, Chen C (2020) A collusion attack on identity-based public auditing scheme via Blockchain. Proc Intell Inform Hiding and Multimed Sig Process 156:97\u2013105","journal-title":"Proc Intell Inform Hiding and Multimed Sig Process"},{"key":"4193_CR36","doi-asserted-by":"crossref","unstructured":"Wang HQ, Wang QH and He DB (2019) Blockchain-based private provable data possession. In: IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2019.2949809"},{"key":"4193_CR37","unstructured":"Zhang Y, Xu CX, Lin XD and Shen XS (2019) Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors. In: IEEE Transactions on Cloud Computing"},{"key":"4193_CR38","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.ins.2020.01.051","volume":"519","author":"H Wang","year":"2020","unstructured":"Wang H, Qin H, Zhao MH, Wei XC, Shen H, Susilo W (2020) Blockchain-based fair payment smart contract for public cloud storage auditing. Inf Sci 519:348\u2013362","journal-title":"Inf Sci"},{"key":"4193_CR39","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1016\/j.future.2019.09.028","volume":"102","author":"PC Wei","year":"2020","unstructured":"Wei PC, Wang DH, Zhao Y, Tyagi SKS, Kumard N (2020) Blockchain data-based cloud data integrity protection mechanism. Futur Gener Comput Syst 102:902\u2013911","journal-title":"Futur Gener Comput Syst"},{"key":"4193_CR40","first-page":"645","volume":"10587","author":"A Sutton","year":"2017","unstructured":"Sutton A, Samavi R (2017) Blockchain enabled privacy audit logs. Proc International Semantic Web Conference 10587:645\u2013660","journal-title":"Proc International Semantic Web Conference"},{"key":"4193_CR41","doi-asserted-by":"crossref","unstructured":"Zhao QY, Chen SY, Liu ZL, Baker T and Zhang Y (2020) Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. In: Information Processing & Management, 57(6)","DOI":"10.1016\/j.ipm.2020.102355"},{"key":"4193_CR42","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ins.2020.07.005","volume":"541","author":"HR Yuan","year":"2020","unstructured":"Yuan HR, Chen XF, Wang JF, Yuan JM, Yan HY, Susilo W (2020) Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci 541:409\u2013425","journal-title":"Inf Sci"},{"key":"4193_CR43","doi-asserted-by":"publisher","first-page":"139813","DOI":"10.1109\/ACCESS.2020.3013153","volume":"8","author":"Y Miao","year":"2020","unstructured":"Miao Y, Huang Q, Xiao MY, Li HB (2020) Decentralized and privacy-preserving public auditing for cloud storage based on Blockchain. IEEE Access 8:139813\u2013139826","journal-title":"IEEE Access"},{"issue":"5","key":"4193_CR44","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TPDS.2010.183","volume":"22","author":"Q Wang","year":"2011","unstructured":"Wang Q, Wang C, Ren K, Lou WJ, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847\u2013859","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"9","key":"4193_CR45","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/TKDE.2011.62","volume":"23","author":"Z Hao","year":"2011","unstructured":"Hao Z, Zhong Sand YuNH (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432\u20131437","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"4193_CR46","doi-asserted-by":"crossref","unstructured":"Xue JT, Xu CX, Zhao JN and Ma JF (2019) Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. In: Science China Information Sciences, 62","DOI":"10.1007\/s11432-018-9462-0"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04193-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04193-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04193-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T14:11:16Z","timestamp":1648822276000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04193-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,10]]},"references-count":46,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["4193"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04193-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,1,10]]},"assertion":[{"value":"3 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}